ARCON Privileged Access Management Benefits

Manager (Systems) at a financial services firm with 10,001+ employees
Our purpose initially was to have a few critical projects. Not to have password management of all projects. So we started on a smaller scope. Later on, we implemented it across the organization. So now, all technical solutions are being controlled by ARCON. And the main area of improvement here is, we have ease of access. People have password-less access and a need-to-know-basis access whenever they require, when the approvals are in place for access. Previously, all this things were handled manually in the environment. Those we have automated, we have eliminated dependency on any manual intervention. Everything is in the system. When a person wants to have access, they put in the data, the requirement, the timing, the other technical parameters. The project managers in charge of the infrastructure, they approve it and the access is available to the person who requires it, all the time. Equally we are able to monitor it all. It gives us the capability of monitoring it online, rather than going to the persons' desk for the activities being done. We sit in our office and monitor what is happening in the target device, using ARCON. The recordings and other things are available, in case any forensics are required. View full review »
Head of Information Security & Risk Assurance at a financial services firm with 501-1,000 employees
It gives us a lot of control functions, which we were lacking in our organization. The privileged users, who are mostly administrators, are configured on the endpoints. We were not previously able to monitor, review, or control this. Therefore, it gives us a lot of comfort in terms of security level. Now, our infrastructure devices and servers are secured and nobody can have unauthorized access to them. Only the authorized users, whom we provide and approve access during any point of time, can access critical devices and mission critical systems. This is the benefit that we receive from this tool. View full review »
Rajesh Gurikar
Manager, RPA at a financial services firm with 51-200 employees
From the administrative point of view, there are cases that I have automated. I used to have to log in to all the servers. Now, it's really simple to work. For compliance, each change I do, in each of the servers, is clearly recorded. We recently faced an audit and this was an awesome feature. Even our auditor had praise for it saying, "This is really a good feature." View full review »
Find out what your peers are saying about ARCON, CyberArk, Broadcom and others in Privileged Access Management. Updated: February 2020.
405,659 professionals have used our research since 2012.
Systems Engineer at a tech services company with 10,001+ employees
Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error. For example, if someone missed the schedule, the password would not be changed. For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself. It has helped us in automating all the work we do. For instance, it helps us in forensic analysis. It helps us find out who has done what; what was done by the user. Also, managing the accounts on the devices has become easier. View full review »
Consultant at a financial services firm with 10,001+ employees
Initially when we started, the function for automatic password change was not available. Also, Windows-based logins were not available. These two features came in later on about four to five years back. These functions have helped improve the product within our organization. View full review »
Praveen Yadav
Information Security Professional at a energy/utilities company with 10,001+ employees
It has improved our government compliance score in terms of audits. Auditors used to ask this basic question: Who has done what? We never had an answer because everyone was logging in using a common ID. The second improvement is the discipline that has developed in the administrators. They definitely want to do things in the right manner and nobody wants to do anything wrong because the recording is going on and everybody knows that they are being watched. View full review »
IT Infrastructure Management at a financial services firm with 51-200 employees
Initially, we did not have any record of the production changes, what was been taking place in our infrastructure and environment. To work on this, we got in touch with ARCON. After the implementation, we were able to make changes and record all of the changes, either in the GUI mode or the command mode. This helps us to build on the changes that take place. View full review »
Anumod Kaimal
Senior Officer- Information Security
Whatever my scope was, it was covered by the application. I recently was having an issue with the Office 365 web browser. Therefore, I reported this problem to the ARCON team, and they brought in developers. They made it compatible with the new browser station of Office 365. View full review »
Farhad Hussain
Senior Consultant (e-Governance) Leveraging ICT for Growth, Employment and Governance at Bangladesh Computer Council
* It helps in managing privileged access management as well as password management. * Auto-discovery * Access control. View full review »
Find out what your peers are saying about ARCON, CyberArk, Broadcom and others in Privileged Access Management. Updated: February 2020.
405,659 professionals have used our research since 2012.